Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:19
Behavioral task
behavioral1
Sample
74f431ce5bc17e1523b38eec734d9c68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74f431ce5bc17e1523b38eec734d9c68.exe
Resource
win10v2004-20231222-en
General
-
Target
74f431ce5bc17e1523b38eec734d9c68.exe
-
Size
66KB
-
MD5
74f431ce5bc17e1523b38eec734d9c68
-
SHA1
765e8ee95a455fc8e545e247c3beff4a0b84d5ce
-
SHA256
9fe372a8eba0110c955fb7e14a35d816e90b0e3a138a25149c1d29c9e4e0bd99
-
SHA512
45f05d5eadffeea57234bc21a21c07310938f1320de5169e1ead0df354b6dbf4543302047d75bcc2a48d6e96760efcce73dbc7ed33b5519b89923d62431e6d2b
-
SSDEEP
1536:bxiNXxDtjW3YXq1mBqZyrnQN0gMt3RySgGakaY/Wjd+LMC:bxiNhDtqIaU0yrno0ZthPggDcq
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VBScritp\Parameters\ServiceDll = "C:\\Windows\\system32\\vscript.dll" rundll32.exe -
Processes:
resource yara_rule \Program Files (x86)\Common Files\notepad.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
notepad.exepid process 2052 notepad.exe -
Loads dropped DLL 4 IoCs
Processes:
74f431ce5bc17e1523b38eec734d9c68.exerundll32.exesvchost.exepid process 2132 74f431ce5bc17e1523b38eec734d9c68.exe 2132 74f431ce5bc17e1523b38eec734d9c68.exe 2036 rundll32.exe 2768 svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\vscript.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\vscript.dll rundll32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
74f431ce5bc17e1523b38eec734d9c68.exedescription ioc process File created C:\Program Files (x86)\Common Files\notepad.exe 74f431ce5bc17e1523b38eec734d9c68.exe File opened for modification C:\Program Files (x86)\Common Files\notepad.exe 74f431ce5bc17e1523b38eec734d9c68.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2052 notepad.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
74f431ce5bc17e1523b38eec734d9c68.exenotepad.exedescription pid process target process PID 2132 wrote to memory of 2052 2132 74f431ce5bc17e1523b38eec734d9c68.exe notepad.exe PID 2132 wrote to memory of 2052 2132 74f431ce5bc17e1523b38eec734d9c68.exe notepad.exe PID 2132 wrote to memory of 2052 2132 74f431ce5bc17e1523b38eec734d9c68.exe notepad.exe PID 2132 wrote to memory of 2052 2132 74f431ce5bc17e1523b38eec734d9c68.exe notepad.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe PID 2052 wrote to memory of 2036 2052 notepad.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f431ce5bc17e1523b38eec734d9c68.exe"C:\Users\Admin\AppData\Local\Temp\74f431ce5bc17e1523b38eec734d9c68.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Common Files\notepad.exe"C:\Program Files (x86)\Common Files\notepad.exe" C:\Users\Admin\AppData\Local\Temp\74f431ce5bc17e1523b38eec734d9c68.exe2⤵
- Executes dropped EXE
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\5D4C.tmp" "8A'+ [=[SCMR'8[='U"3⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:2036
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5D4C.tmpFilesize
101KB
MD55732e816e2b58a1c1eafdb8bc11cc00a
SHA1cbbc16d43171c2da3244955341f1bb5ed1784c45
SHA256b7f8acfcc9da8c954a5e381b5e9081cd28eb29f88778a0de24ba522eaaf94f98
SHA512ea068ad71a725ac06a087ae48b9f7ae05468fd213c552b3a42ad57765ebfdd57de2b5cc7bcbf698cf80c7284d93140764092a69f840873abee3551f37b5fae19
-
\Program Files (x86)\Common Files\notepad.exeFilesize
66KB
MD574f431ce5bc17e1523b38eec734d9c68
SHA1765e8ee95a455fc8e545e247c3beff4a0b84d5ce
SHA2569fe372a8eba0110c955fb7e14a35d816e90b0e3a138a25149c1d29c9e4e0bd99
SHA51245f05d5eadffeea57234bc21a21c07310938f1320de5169e1ead0df354b6dbf4543302047d75bcc2a48d6e96760efcce73dbc7ed33b5519b89923d62431e6d2b
-
memory/2036-13-0x00000000000B0000-0x00000000000CF000-memory.dmpFilesize
124KB
-
memory/2036-19-0x00000000000B0000-0x00000000000CF000-memory.dmpFilesize
124KB
-
memory/2052-9-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2132-10-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2768-18-0x0000000000190000-0x00000000001AF000-memory.dmpFilesize
124KB
-
memory/2768-20-0x0000000000190000-0x00000000001AF000-memory.dmpFilesize
124KB